Rapid7 Vulnerability & Exploit Database

RHSA-2012:0070: ruby security update

Back to Search

RHSA-2012:0070: ruby security update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
12/29/2011
Created
07/25/2018
Added
02/02/2012
Modified
05/02/2018

Description

Ruby is an extensible, interpreted, object-oriented, scripting language. Ithas features to process text files and to do system management tasks.A denial of service flaw was found in the implementation of associativearrays (hashes) in Ruby. An attacker able to supply a large number ofinputs to a Ruby application (such as HTTP POST request parameters sent toa web application) that are used as keys when inserting data into an arraycould trigger multiple hash function collisions, making array operationstake an excessive amount of CPU time. To mitigate this issue, randomizationhas been added to the hash function to reduce the chance of an attackersuccessfully causing intentional collisions. (CVE-2011-4815)It was found that Ruby did not reinitialize the PRNG (pseudorandom numbergenerator) after forking a child process. This could eventually lead to thePRNG returning the same result twice. An attacker keeping track of thevalues returned by one child process could use this flaw to predict thevalues the PRNG would return in other child processes (as long as theparent process persisted). (CVE-2011-3009)Red Hat would like to thank oCERT for reporting CVE-2011-4815. oCERTacknowledges Julian Wälde and Alexander Klink as the original reporters ofCVE-2011-4815.All users of ruby are advised to upgrade to these updated packages, whichcontain backported patches to resolve these issues.

Solution(s)

  • redhat-upgrade-irb
  • redhat-upgrade-ruby
  • redhat-upgrade-ruby-devel
  • redhat-upgrade-ruby-docs
  • redhat-upgrade-ruby-irb
  • redhat-upgrade-ruby-libs
  • redhat-upgrade-ruby-mode
  • redhat-upgrade-ruby-rdoc
  • redhat-upgrade-ruby-ri
  • redhat-upgrade-ruby-tcltk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;